Big Halloween Sale 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: best70

FCSS_SASE_AD-25 FCSS - FortiSASE 25 Administrator Questions and Answers

Questions 4

Your organization is currently using FortiSASE for its cybersecurity. They have recently hired a contractor who will work from the HQ office and who needs temporary internet access in order to set up a web-based point of sale (POS) system.

What is the recommended way to provide internet access to the contractor?

Options:

A.

Use zero trust network access (ZTNA) and tag the client as an unmanaged endpoint.

B.

Use the self-registration portal on FortiSASE to grant internet access.

C.

Use a tunnel policy with a contractors user group as the source on FortiSASE to provide internet access.

D.

Use a proxy auto-configuration (PAC) file and provide secure web gateway (SWG) service as an explicit web proxy.

Buy Now
Questions 5

Which two settings are automatically pushed from FortiSASE to FortiClient in a new FortiSASE deployment with default settings? (Choose two.)

Options:

A.

zero trust network access (ZTNA) tags

B.

tunnel profile

C.

FortiSASE certificate authority (CA) certificate

D.

real-time protection

Buy Now
Questions 6

Which information does FortiSASE use to bring network lockdown into effect on an endpoint?

Options:

A.

Zero-day malware detection on endpoint

B.

The number of critical vulnerabilities detected on the endpoint

C.

The security posture of the endpoint based on ZTNA tags

D.

The connection status of the tunnel to FortiSASE

Buy Now
Questions 7

In the Secure Private Access (SPA) use case, which two FortiSASE features facilitate access to corporate applications? (Choose two.)

Options:

A.

cloud access security broker (CASB)

B.

SD-WAN

C.

zero trust network access (ZTNA)

D.

thin edge

Buy Now
Questions 8

How does FortiSASE hide user information when viewing and analyzing logs?

Options:

A.

By tokenization in log data

B.

By masking log data

C.

By compressing log data

D.

By hashing log data

Buy Now
Questions 9

Refer to the exhibit.

FCSS_SASE_AD-25 Question 9

While reviewing the traffic logs, the FortiSASE administrator notices that the usernames are showing random characters.

Why are the usernames showing random characters?

Options:

A.

Log anonymization is turned on to hash usernames.

B.

Special characters are used in usernames.

C.

Users are using a shared single sign-on SSO username.

D.

FortiSASE uses FortiClient unique identifiers for usernames.

Buy Now
Questions 10

Refer to the exhibit.

FCSS_SASE_AD-25 Question 10

An organization must inspect all the endpoint internet traffic on FortiSASE, and exclude Google Maps traffic from the FortiSASE VPN tunnel and redirect it to the endpoint physical interface.

Which configuration must you apply to achieve this requirement?

Options:

A.

Configure a steering bypass tunnel firewall policy using Google Maps FQDN to exclude and redirect the traffic.

B.

Add the Google Maps URL in the zero trust network access (ZTNA) TCP access proxy forwarding rule.

C.

Add the Google Maps URL as a steering bypass destination in the endpoint profile.

D.

Exempt Google Maps in URL filtering in the web filter profile.

Buy Now
Questions 11

Refer to the exhibits.

FCSS_SASE_AD-25 Question 11

FCSS_SASE_AD-25 Question 11

FCSS_SASE_AD-25 Question 11

FCSS_SASE_AD-25 Question 11

A FortiSASE administrator has configured FortiSASE as a spoke to a FortiGate hub. The tunnel is up to the FortiGate hub. However, the remote FortiClient is not able to access the web server hosted behind the FortiGate hub.

Based on the exhibits, what is the reason for the access failure?

Options:

A.

A private access policy has denied the traffic because of failed compliance

B.

The hub is not advertising the required routes.

C.

The hub firewall policy does not include the FortiClient address range.

D.

The server subnet BGP route was not received on FortiSASE.

Buy Now
Questions 12

What is required to enable the MSSP feature on FortiSASE?

Options:

A.

Role-based access control (RBAC) must be assigned to identity and access management (IAM) users using the FortiCloud IAM portal.

B.

The MSSP add-on license must be applied to FortiSASE.

C.

MSSP user accounts and permissions must be configured on the FortiSASE portal.

D.

Multi-tenancy must be enabled on the FortiSASE portal.

Buy Now
Questions 13

An organization must block user attempts to log in to non-company resources while using Microsoft Office 365 to prevent users from accessing unapproved cloud resources.

Which FortiSASE feature can you implement to meet this requirement?

Options:

A.

application control with inline-CASB

B.

data loss prevention (DLP) with Microsoft Purview Information Protection (MPIP)

C.

web filter with inline-CASB

D.

DNS filter with domain filter

Buy Now
Questions 14

What happens to the logs on FortiSASE that are older than the configured log retention period?

Options:

A.

The logs are deleted from FortiSASE.

B.

The logs are indexed and can be stored in a SQL database.

C.

The logs are backed up on FortiCloud.

D.

The logs are compressed and archived.

Buy Now
Questions 15

When accessing the FortiSASE portal for the first time, an administrator must select data center locations for which three FortiSASE components? (Choose three.)

Options:

A.

Identity & access management (IAM)

B.

Points of presence

C.

Endpoint management

D.

Logging

E.

Sandbox

Buy Now
Exam Code: FCSS_SASE_AD-25
Exam Name: FCSS - FortiSASE 25 Administrator
Last Update: Oct 30, 2025
Questions: 53

PDF + Testing Engine

$134.99

Testing Engine

$99.99

PDF (Q&A)

$84.99